Instruction Manual for BicDroid QDocument (Mac OS X 10.9 or higher)
|
|
- Juliet Cain
- 8 years ago
- Views:
Transcription
1 Instruction Manual for BicDroid QDocument (Mac OS X 10.9 or higher) (Basic, Premium, and Professional Editions) Version 1.1 BicDroid.com
2 TABLE OF CONTENTS Installation... 1 Registration. 2 Verification Code 5 Using BicDroid QDocument (QDoc). 6 Section 1: Adjusting QDocument Account Settings 6 Section 2: Encryption Section 3: Decryption 13 Section 4: Secure Sharing. 14 Section 5: Secured Inbound Folders 19 Section 6: Viewing Your List of Authorized Users 20 Section 7: QNote Section 8: General. 22
3 INSTALLATION 1. Download the installer image, which requires MAC OS X Mavericks (10.9) or higher, from html 2. After downloading and double clicking the installer image, an Installation page will be shown. Refer to Figure 1. Double click the QDocument-Installer icon to start the installation process. Figure 1 3. A window will pop up to ask for admin credential (your username and password). After typing in, QDocument will be installed and automatically launched. Refer to Figure 2. Figure 2 1
4 1. Once the installation is complete, a login window will appear (see Figure 3). If you are a new user and do not have a BicDroid account, click on the Sign up buttons to begin the user registration process. Otherwise, sign in with your account address/phone number and password. REGISTRATION 2. Once the button Sign up with your address is clicked, a new window (Figure 4) will appear. Type in your address as your user name. Refer to Figure 4. Figure 3 Figure 4 If the button Sign up with your mobile number is clicked, a new window (Figure 5) will appear. Under the Select your country drop down box, select your country. Type in your mobile number in the appropriately labeled box. Refer to Figure 5. Figure 5 2
5 3. Once you ve put in your address or mobile number, you can now set up your password for your BicDroid account. 4. After you have typed in your address/phone number and password, click the Register button at the bottom of the window. 5. A confirmation window will pop up, stating that a confirmation /text message with a four digit confirmation code has been sent to you. Refer to Figure 6. Figure 6 6. Check your /text message to get your confirmation code (refer to Figure 7), and enter it to the text box in Figure Once the registration has been completed, proceed to the login window and sign in with your credentials. Figure 7 8. After logging in for the first time, a window will ask for you to create your verification code. The requirements of the code are listed on the window. Refer to Figure 8. It is recommended that your password and verification code be different since they serve different purposes. Your password acts as a standard web application password while your verification code is used to guard local encryption and decryption. Figure 8 3
6 9. A window for uploading your selfie will appear (Figure 9). Click the Take now button to take a selfie and then click the Save button at the bottom right of the window. 10. A QDocument icon will show up in the right top corner of your screen. You may click on the icon to view the full menu. Refer to Figure 10. Figure Note: If your computer is shared with multiple users, each of the other users can create his/her own BicDroid account once QDoc is installed on your shared computer. After logging into the shared computer, that user clicks the QDoc icon on the desktop. Then the login window (Figure 3) will appear. Follow the above procedure to complete his/her own BicDroid account registration. Figure 10 4
7 1. After the initial registration, you will be asked to type in your verification code every time when QDocument exits and you want to re-run QDocument. Refer to Figure 11. VERIFICATION CODE 2. In the window that prompts you to enter your verification code, there is another box at the bottom for when you forget your verification code. Refer to Figure 11. a) This box is for when you forget your verification code. Provided that your selfie is taken (see how to take your selfie in pages 4 and 7), if you forget your verification code, click the Recover button. This will take you through QDocument s verification code recovery process. Figure 11 5
8 Section 1: Adjusting QDocument Account Settings USING QDOC Section 1.1: User Info 1. The first item in the QDoc dropdown menu is User Info, where you can add aliases. An alias is another name (e.g., your other address) you can use to access this account. By adding aliases, you can link your different accounts to your BicDroid account. QDoc can now be accessed using any name in Aliases. Refer to Figure 12. Figure To add an alias, click on the Add alias button. 3. A new window will show up, asking for your alias type and your alias. See Figures 13.1 and Select the address or Mobile phone number option, and then enter your alias. Click the Next button to continue. 5. After clicking Next, a new window will pop up, telling you that a four digit combination has been sent to your /texts and prompting you for the combination. See Figure 13.3 for example. Figure 13.1 Figure 13.2 Figure 13.2 Figure
9 6. Once you have submitted the confirmation code, click Confirm. The alias account has been successfully added and should show up in the Aliases box on the User Info window. Refer to Figure If you want to change your verification code, click on the Change Verification Code button at the bottom of the User Info window. Refer to Figure 14. Figure Once clicked, QDocument will ask for you to input your current verification code and then your new verification code. Refer to Figure Once you have clicked OK, an will be sent to you, saying that your verification code has been successfully changed. Refer to Figure The Take a selfie button allows you to take a selfie, which has to be taken before you forget your verification code. Figure 15 Figure 11 Figure 16 7
10 Section 1.2: Secured Folders 1. The Secured Folders menu item allows you to secure selected folders by encrypting all files inside therein and enforcing access control for the encrypted files. To secure a folder, click on the Add button. A list of your folders will show up. Select the folder you wish to secure and click Open. Refer to Figure After clicking Open, a window called Permission Control Panel will appear (Figure 18). To give other users your permission to view encrypted files in your selected folder, add their IDs to the list of Authorized Users. a) Select either an address or a mobile phone number, type in the address or mobile phone number of the user in the respective box, and click the Add button to add the user to your list of Authorized Users (for this folder). b) In the bottom left of the Permission Control Panel, there is the Existing Contacts in QSS System feature. It keeps track of any users you have ever added to any of your Authorized Users list. Click on a user from the contact list and it will show up in the Authorized Users list on the right hand side. Refer to Figure 19. c) If you want to remove a user from your Authorized User list, highlight their name and click the Remove Highlighted Item button, which is found directly Figure 21 Figure 17 Figure 18 Figure 19 Figure 15 Figure 20 8
11 underneath the Authorized Users. Refer to Figure 20. d) Once you have added the users you wish to be able to view your encrypted files, click Next, and the folder will show up in your Secured Folders tab. Refer to Figure 21. Click Apply afterwards. e) By highlighting/clicking a folder in your list of secured folders, you can see the list of authorized users for that folder. Refer to Figure 21. Figure If you want to remove a folder from your list of secured folders, click Remove and then Apply. That folder will be unguarded, and all encrypted files therein will be automatically decrypted. 4. If you want to modify the list of authorized users for a folder, click on the Modify button; it will open a Permission Control Panel window (Figure 18). After you ve made your modifications, click Apply. 5. Once you secure a folder, you can move a plaintext file into it, which will automatically be encrypted. Refer to Figure The Secured Folders menu item also has the option to allow different authorized users access to subfolders. A subfolder is a folder found in another folder ( umbrella folder). Figure 22 9
12 7. To add a subfolder to your list of Secured Folders, refer to Steps 1 and 2 of this section. Once the Permission Control Panel window opens up, you can add any authorized users you wish. Your subfolder can have different authorized users than your umbrella folder. Refer to Figure 23.1 and If you want to decrypt a file(s) that is under a secured folder, you need to first move the file(s) out of the secured folder. Once it s been moved, it s still encrypted but now you individually decrypt it. Refer to Using QDoc: Section 3 Decryption on how to decrypt files that aren t in a secured folder. Figure 23.1 Section 1.3: Default Programs (This section can be skipped for new users) 1. The Default Programs menu item allows you to open decrypted files from QDoc. QDoc will take the extension of any opened encrypted files and open it with a default program. If you want to open any decrypted file, QDoc will recognize its extension and open it with the default program associated with that extension. However, if QDoc does not recognize the extension of the document, it will prompt you to add a default program with which to open any documents containing that extension. Figure
13 2. You can also change the program used to open a file by QDoc when there is no default program assigned to that extension name in the operating system. Highlight the extension that you want to attach a new program and then click Change Default Setting at the bottom. Refer to Figure A new window will open with all your programs. Find the program you want to open the extension with, click it and then click OK. Refer to Figure 25. QDoc will now open your documents with that extension with that program. Figure 24 Figure 25 11
14 Section 2: Encryption 1. QDoc offers two ways of encryption: folder(s) or individual file(s). For instructions on how to encrypt a folder(s), refer back to Using QDoc: Section 1.2 Secured Folders. For instructions on how to encrypt individual file(s), continue reading. 2. In your documents, select the file(s) that you want to encrypt. 3. After selecting the file(s), right click on it/them and click on Operate with QDocument in the Services menu. Refer to Figure 26. Figure A QDoc window will open with a list of selected file(s) under Plaintext files. To encrypt selected file(s) for YOURSELF only, select the Encrypt option and click OK. Refer to Figure To encrypt selected files for sharing with others, select the Encrypt for sharing option instead, and then follow Sections 4.1 and 4.2 to complete the sharing process. Figure 27 12
15 Section 3: Decryption 1. Similar to encryption, QDoc offers you two ways of decryption: folder(s) or individual file(s). For instructions on how to decrypt a folder(s), refer back to Step 3 in Using QDoc: Section 1.2 Secured Folders. For instructions on how to decrypt individual file(s), continue reading. 2. In your documents, select the file(s) that you want to decrypt. 3. After selecting the file(s), right click on it/them and click on Operate with QDocument in the Services menu. Refer to Figure 28. Figure A QDoc window will open with a list of your file(s) under Encrypted files. To decrypt your encrypted file(s), select the Decrypt option and click on OK. Refer to Figure Note that if your selected file(s) include both encrypted and plaintext files, they will be listed under two or three groups in the QDoc window: one for your plaintext files, one for your owned encrypted files, and one for your received encrypted files (not owned). In some editions, decryption does not apply to your received encrypted files. Figure 29 13
16 Section 4: Secure Sharing Section 4.1: Through attachment 1. When you select file(s) to be encrypted/decrypted with QDoc, there is also an option to share them securely. Follow the steps for encrypting/decrypting files, but instead of selecting the Encrypt or Decrypt option, select the Encrypt for sharing option. Refer to Figure After clicking OK, a Permission Control Panel window will open (refer back to Figure 18), prompting you to add your recipient(s) to the authorized user list for that file(s). Refer to Using QDoc Section 1.2: Secured Folders for a step by step instruction on how to add and remove users. Once your recipient(s) has been added, click Next. Figure 30 Figure A new window will pop up with different sharing options. Refer to Figure If you want to send your selected file(s) as an attachment(s), select Share by and then click Encrypt and Share. (Note: in order to use this feature, an client should be activated. If not, a later part will cover how to send them using your browser.) Your client will open and attach your now encrypted file(s) (if not encrypted before) to an with the recipient(s) automatically filled. Refer to Figure 32. All you need to do now is compose a message and press send. Figure 32 14
17 If you don t have an client, select Save to a Folder, and then click Encrypt and Share. Follow Steps in Section 4.2 and then attach the encrypted file(s) yourself to your in your browser. Section 4.2: Through a physical medium (e.g., USB) 1. QDoc also allows you to securely share your files through a physical medium (such as a portable USB Stick) by saving your selected file(s) to a folder. In Figure 31, select Save to a Folder and then click Encrypt and Share. A file explorer will appear. Choose a folder you want to save your file(s) in and click Open. Your file(s) has now been encrypted and transferred to the folder you chose earlier. Refer to Figure 33. Figure 33 15
18 Section 4.3: Through clouds and/or shared folders in clouds 1. QDoc also has a third option for secure sharing: sharing files through clouds and/or shared folders on a cloud drive. a) After you secure a cloud folder (such as Dropbox, Google Drive folder, One Drive, etc.) or a subfolder thereof, QDoc automatically creates a mirror drive for each of such cloud folders. The mirror drive and the corresponding cloud folder contain the same files and subfolders. Files and subfolders dropped in the mirror drive appear automatically in the corresponding cloud folder, and vice versa. If you secure a cloud folder, its mirror drive is secured at the same time. The same is true for their subfolders. Those mirror drives may be accessed by clicking Mirrored Cloud Folders in the main QDoc dropdown menu on the top right corner, as shown in Figure 34. b) To securely sync files/subfolders with your cloud and across your own devices, first follow the step by step instruction in Using QDoc Section 1.2: Secured Folders to secure the entire cloud folder or its subfolders, and then Figure 34 16
19 drop files into the mirror drive or its corresponding subfolders. Dropped files will be automatically encrypted before they are synced with your cloud provider thus ensuring 100% sensitive data encryption. c) To securely share files through a shared folder on a cloud drive with others, first create a secured folder on the cloud drive by following the step by step instruction in Using QDoc Section 1.2: Secured Folders. d) To add the people you want to share this secured folder with, you need to add them to your list of authorized users for that folder. Refer back to Using QDoc Section 1.2: Secured Folders for instructions on how to do this. Afterwards, share that folder with your desired users (that are already authorized users in QDoc) through the actual cloud drive. e) Once you have secured and shared the folder through QDoc and the cloud drive, respectively, you can now drop files into that folder in the corresponding mirror drive. Dropped files will be automatically encrypted before they are synced with your cloud provider servers and shared with your authorized users. 17
20 f) Depending on how you shared the folder in the cloud drive, all the users that have access to this secured folder could add files into the folder. Any file(s) that has/have been added to the folder is automatically encrypted. Section 4.4: Through any other channels such as imessage, shared links, etc. Once your selected files are encrypted with a list of authorized users through either a secured folder or Steps in Section 4.2, they can be shared with the authorized users through whatever channel you like, such as shared links, Skype, imessage, etc. No matter which way you select to share through, the sharing is secure with QDoc. 18
21 Section 5: Secured Inbound Folders 1. Clicking the Secured Inbound Folders item in the dropdown menu opens a Secured Inbound Folders window, which shows the folders that are secured using QDoc and newly shared with you through a cloud by other users. Refer to Figure 35. Figure Once another user ( Initiator ) secures a folder using QDoc on his/her device and shares it with you through a cloud, it will show up in the Secured Inbound Folders window on your device. Refer to Figure Unless you click Accept, that shared folder won t show up in your Secured Folders window; files you drop into that shared folder will be encrypted on Initiator s device instead. Refer to Figures 37.1 and After clicking Accept, that shared folder is also secured on your device and moves to your Secured Folders window; files you drop into that shared folder will be encrypted on your device before syncing and sharing. Refer to Figure If you do not wish to secure the shared folder on your device, click Decline on the bottom left. For your protection, it is recommended that you always click Accept. Figure 36 Figure 37.1 Figure 37.2 Figure 38 19
22 Section 6: Viewing Your List of Authorized Users Section 6.1: Authorized users for secured folders 1. To view the list of authorized users for a secured folder, highlight the secured folder by clicking on it in the Secured Folders window. The list of its authorized users will show under Authorized Users on the right side of the window. Refer to Figure 21 and Section 1.2: Secured Folders. Section 6.2: Authorized users for encrypted files 1. To view the list of the authorized users for your encrypted files, right click on the file(s) you want to see the list of authorized users for and click on Operate With QDocument. Refer to Figure 28. Figure A list of your encrypted files will show up, such as in Figure 29. To view the list of authorized users for an individual encrypted file, highlight the file by clicking on it. A pop up will open listing your authorized users for the file. Refer to Figure
23 Section 7: BicDroid QNote 1. BicDroid QNote is a quarantined note-taking system which memorizes and strongly safeguards all of your secrets and synchronizes them cross icloud. To access QNote, click on QNote in the main dropdown menu, as shown in Figure A QNote window will appear after clicking on the QNote item in the main drop down menu. QDocument will automatically detect and show all QNotes in icloud. Refer to Figure 41. Figure You can click on New button to create a new note. A window will pop up for the new note name. See Figure 42 for an example. 4. QNote provides a text search bar for titles, which help to organize when there are many notes. See the top left bar in Figure 41. Figure 41 Figure 42 21
24 Section 8: Help and Quit 1. The Help menu item contains five sub-menu items: About, License, Quick Start, Instruction Manual, FAQ. Refer to Figure By clicking on the About submenu item, you will be redirected to the Our Products page on the BicDroid website that gives you a more detailed description of QDocument. 3. By clicking on the License submenu item, you will be redirected to the License page on the BicDroid website. 4. By clicking on the Quick Start sub-menu item, you will be redirected to the quick start page of QDocument. 5. By clicking on the Instruction Manual sub-menu item, you will be redirected to a PDF of QDocument s user manual. 6. By clicking on FAQ sub-menu item, you will be redirected to the FAQ page on the BicDroid website. If your question isn t listed, feel free to contact us at support@bicdroid.com. 7. By clicking on the Quit menu item, you will quit QDocument. To access any of your encrypted files, you will have to re-launch QDocument and type in your verification code. Figure 43 22
25 Thank you for using BicDroid QDocument! Contact us: General information: Technical support: Business: 23
Instruction Manual for BicDroid QDocument
Instruction Manual for BicDroid QDocument (Basic, Premium, and Professional Editions) Version 1.1 BicDroid.com TABLE OF CONTENTS Installation... 1 Registration. 2 Verification Code 5 Using BicDroid QDocument
More informationMac OS X User Manual Version 2.0
Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
More informationWelcome to ncrypted Cloud!
Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the
More informationMiraCosta College now offers two ways to access your student virtual desktop.
MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends
More informationInitial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion
Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol
More informationHow to Use JCWHosting Reseller Cloud Storage Solution
How to Use JCWHosting Reseller Cloud Storage Solution Go to https://www.internetspace.co.za and log in with your Cloud Reseller account username and password. How to Use create a cloud account for your
More informationHow To Sync Google Drive On A Mac Computer With A Gmail Account On A Gcd (For A Student) On A Pc Or Mac Or Mac (For An Older Person) On An Ipad Or Ipad (For Older People) On
Installation and Setup of Google Drive for Students on Mac OS X Purpose: This guide will lead you through the Google Drive Installation and Configuration. Pre-requisites: 1) ODU Student Gmail account 2)
More informationQuick View. Folder Details
Quick View You MUST be logged in to access any information inside the IONU system. If you aren t logged in, you will not see the folders and the data and files cannot be accessed and decrypted. All files,
More informationowncloud Configuration and Usage Guide
owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,
More informationHow To Set Up An Apple Mail Account On A Mac Computer Or Macbook With A Password Protected Email (For A Mac) For A Long Time (For An Older Computer) For Free (For New Mac) (For Older Mac)
Apple Mail Email Setup Account Types 2 Exchange account 3 POP account 4 Maintenance Setting up an Email signature 6 Checking Email Storage 7 Archiving Emails 8 Troubleshooting Checking your Account Settings
More informationAccessing vlabs using the VMware Horizon View Client for OSX
Accessing vlabs using the VMware Horizon View Client for OSX This document will demonstrate how to download, install, and connect to a virtual lab desktop from a personal Mac OSX computer using the VMware
More informationRemote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
More informationIONU BETA USER MANUAL IONU Security, Inc.
2014 IONU BETA USER MANUAL IONU Security, Inc. Contents IONU Solution Intro... 3 Account Installation Process... 4 Account Creation - Windows... 5 Inviting Others... 6 IONU Secure File System... 7 Storage
More informationHow to Remotely Access the C&CDHB Network from a Personal Device
How to Remotely Access the C&CDHB Network from a Personal Device 13/09/2012 Contents Installing the Citrix Receiver for Windows PCs... 2 Installing the Citrix Receiver for Mac OS X... 6 Installing the
More informationCHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
More informationSimple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015
Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Table of Contents Logging into the Drive Application 4 Log In Sign Up Access the Drive Application
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationSOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
More informationUpon Installation, Soda
Upon Installation, Soda Prompts you to create your user profile to register for a new profile Note: Asks your for your particulars Prompts you to select a password. You would need to provide this password
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationInitial Setup of Mozilla Thunderbird with IMAP for OS X Lion
Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access
More informationWelcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5. Getting Started 1.2... 7 Download ncrypted Cloud...
Windows User Manual Welcome to ncrypted Cloud!... 4 Getting Started 1.1... 5 Register for ncrypted Cloud... 5 Getting Started 1.2... 7 Download ncrypted Cloud... 7 Getting Started 1.3... 9 Access ncrypted
More informationFaith Lutheran College, Redlands. Install and Setup Office 365
Faith Lutheran College, Redlands Install and Setup Office 365 Table of Contents Install Office 365... 3 Set up my current Office desktop programs to work with Office 365 for business... 4 Connect your
More informationMacs are not directly compatible with Noetix.
Those that use Macintosh computers to access Noetix cannot directly access Noetix through http://www.sandiego.edu/noetix. If one is on a Mac and goes to Noetix directly in a web browser, the page is likely
More informationInstructions for using VPN and accessing your files remotely
Instructions for using VPN and accessing your files remotely Be sure that you have the latest version of JAVA installed on your computer. Go to https://sslvpn.uco.edu and sign in using your domain username
More informationCitrix Client Install Instructions
Citrix Client Install Instructions If you are using Citrix remotely, Information Technology Services recommends updating Citrix client to the newest version available online. You must be an administrator
More informationParishSOFT Remote Installation
Table of Contents Setting up Remote Solution Windows 7 or Vista... 1 Connecting to ParishSOFT... 1 Accessing Your database... 3 Switching to your parish database... 4 Setting up Accounts for users... 5
More informationOneDrive for Business FAQ s Updated 6/19/14
OneDrive for Business FAQ s Updated 6/19/14 What is OneDrive for Business? OneDrive for Business is an online service that provides resources for file storage, collaboration, and communication. It provides
More informationCloudifile: Frequently Asked Questions
Cloudifile: Frequently Asked Questions 1 Contents Cloudifile Compatibility... 3 Cloudifile Installation... 4 Cloudifile Account Registration... 5 Working with Cloudifile... 6 Cloudifile Functionality...
More informationWatchDox for Mac User Guide
WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationFrequently Asked Questions
Frequently Asked Questions Share Drive Frequently Asked Questions Table of Contents How do I change my password?... How do I reset my password if I forgot it?... How do I share files/folders with Groups
More informationZoho CRM and Google Apps Synchronization
Zoho CRM and Google Apps Synchronization Table of Contents End User Integration Points 1. Contacts 2. Calendar 3. Email 4. Tasks 5. Docs 3 6 8 11 12 Domain-Wide Points of Integration 1. Authentication
More informationOnline File Folder. Getting Started Guide. Become an Expert at Managing Your Files Online. wind. Online File Folder // Getting Started Guide
Getting Started Guide Online File Folder Become an Expert at Managing Your Files Online Getting Started Guide Page 1 Getting Started Guide: Online File Folder Version 2.1 (2.22.11) Copyright 2010. All
More informationReading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)
Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email
More informationJumble for Microsoft Outlook
Jumble for Microsoft Outlook Jumble is a zero knowledge, end- to- end email encryption solution that integrates with existing email platforms. Jumble integrates at the email client level and removes the
More informationMyMediasite Web Interface Overview:
MyMediasite Web Interface Overview: 1. Visit http://mymediasite.bloomu.edu from any web browser. 2. Log in using your complete email address and university password. 3. You should now see the following
More informationInstallation Guide. Research Computing Team V1.9 RESTRICTED
Installation Guide Research Computing Team V1.9 RESTRICTED Document History This document relates to the BEAR DataShare service which is based on the product Power Folder, version 10.3.232 ( some screenshots
More informationIONU PRO Product Overview
Quick View ü You MUST be logged in to access any information inside the IONU system. If you aren t logged in, you will not see the folders and the data and files cannot be accessed and decrypted. ü All
More informationHow To Connect Your Cloud
How To Connect Your Cloud This tutorial will show you how to connect ncrypted Cloud to multiple cloud storage accounts after installation. This will allow you to apply privacy to all cloud data right from
More informationGetting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class
Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class A Guide for Administrators Table of Contents Requirements... 3 1. Activate & Setup Online Software
More informationAbout DropSend. Sending Files with DropSend
About DropSend DropSend is a service that allows businesses and individuals to send large files, store files online and collaborate in a quick and easy way. DropSend Business Plan will help your company
More informationHallpass Instructions for Connecting to Mac with a Mac
Hallpass Instructions for Connecting to Mac with a Mac The following instructions explain how to enable screen sharing with your Macintosh computer using another Macintosh computer. Note: You must leave
More informationInitial Setup of Microsoft Outlook with Google Apps Sync for Windows 7. Initial Setup of Microsoft Outlook with Google Apps Sync for Windows 7
Microsoft Outlook with Initial Setup of Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access
More informationB&SC Office 365 Email
B&SC Office 365 Email Microsoft Office 365 In its continuous efforts to provide the highest quality student experience, Bryant & Stratton College is giving students access to a new tool for accessing email.
More informationi>clicker v7 Gradebook Integration: Blackboard Learn Instructor Guide
i>clicker v7 Gradebook Integration: Blackboard Learn July 2015 Table of Contents Overview... 3 Step 1: Prepare a Configured Version of i>clicker... 4 Step 2: Configure your i>clicker Software... 5 Step
More informationFAQs. OneDrive for Business?
Contents FAQs... 1 From a Web Browser (for PCs and mobile devices)... 1 From the OneDrive for Business Sync Application (for PCs only)... 2 From Office 2013 (for PCs only)... 3 From the OneDrive for Business
More informationSophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 6.1
Sophos SafeGuard File Encryption for Mac Quick startup guide Product version: 6.1 Document date: January 2014 Contents 1 About SafeGuard File Encryption for Mac...3 2 First use...4 3 Working with SafeGuard
More informationClicktoFax Service Usage Manual
ClicktoFax Service Usage Manual 1. Log in to Fax Service 2. Configure your account 3. Send a fax 4. Receive a fax/search for Faxes/View Faxes 5. Logout 6. Additional Support 1. Log into fax service: a.
More informationApple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry...
Contents Email Accounts... 3 Adding accounts... 3 Account Modifications... 6 Adding Aliases... 7 Primary E-mail Addresses... 10 Mailbox Quotas... 12 Removing accounts... 13 Mail Forwarding and Distribution
More informationGetting started with OneDrive
Getting started with OneDrive What is OneDrive? OneDrive is an online storage area intended for business purposes. Your OneDrive library is managed by the University. You can use it to share documents
More informationGREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
More information1. Open the Account Settings window by clicking on Account Settings from the Entourage menu.
Using TLS Encryption with Microsoft Entourage This guide assumes that you have previously configured Entourage to work with your Beloit College email account. If you have not, you can create an account
More informationBooth Gmail Configuration
Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile
More informationQuick Start Guide. Installation and Setup
Quick Start Guide Installation and Setup Introduction Velaro s live help and survey management system provides an exciting new way to engage your customers and website visitors. While adding any new technology
More informationHow to use SURA in three simple steps:
How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.
More informationUCB erequest IIS Requestor - Quick Reference Guide
UCB erequest - CONTENTS 1 INTRODUCTION... 3 2 HOW TO REGISTER AND LOG-IN... 3 2.1 REGISTER TO RECEIVE AN EXTERNAL REQUESTOR USER ID AND PASSWORD... 3 2.2 LOGIN WITH USER ID AND PASSWORD... 5 3 HOW TO SUBMIT
More informationFAQs. OneDrive for Business?
Contents FAQs... 1 From a Web Browser (for PCs and mobile devices)... 1 From the OneDrive for Business Sync Application (for PCs only)... 2 From Office 2013 (for PCs only)... 3 From the OneDrive for Business
More informationCloudifile Getting Started
Cloudifile Getting Started 1 Contents About... 3 System Requirements... 3 Cloudifile Recommendations for Use... 4 Cloudifile: How It Works?... 6 [Windows] Getting Started... 8 [Mac OS X] Getting Started...
More informationRelease 2.0. Cox Business Online Backup Quick Start Guide
Cox Business Online Backup Quick Start Guide Release 2.0 Cox Business Online Backup Quick Start Guide i IMPORTANT: You must notify Cox in advance if you would like to move or relocate your telephone Service.
More informationRecommended Browser Setting for MySBU Portal
The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,
More informationHow to Configure Entourage 2008 for Email Client
How to Configure Entourage 2008 for Email Client Introduction (Revised 04/28/11) LAUSD IT Helpdesk 333 S. Beaudry Ave. 9 th Floor Phone 213.241.5200 Before you configure Microsoft Entourage 2008 E-mail
More informationInitial Setup of Mac Mail with IMAP for OS X Lion
Concept Initial Setup of Mac Mail This document describes the procedures for setting up the Mac Mail client to receive messages from Google Mail using Internet Message Access Protocol (IMAP) with the Mac
More informationTransitioning Your School Email Account
Transitioning Your School Email Account This tutorial will walk you through transferring the email and other data from your School account to a personal email account. Establish a New Email Address (or
More informationHow do I Install and Use the Cisco VPN Any Connect Client for the Berkeley Campus?
Haas How do I Install and Use the Cisco VPN Any Connect Client for the Berkeley Campus? The Cisco virtual private network (VPN) client allows a computer to make secure network connections via specific
More informationUSER MANUAL. v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------
USER MANUAL v. 1.0.0.95 Windows Client ------------------------ January 2014 ------------------------ 1 Contents At a Glance Troubleshoot 3 About SkyCrypt 23 FAQ 4 About this manual 23 Contact support
More informationLync Quick Start Guide for MAC OS
Microsoft Lync is a unified communications platform that works ideally in a Windows Operating System, but is also feature- rich using a MAC OS. The purpose of this guide is to cover highlights of Lync
More informationSURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE
SURPASS HOSTING SERVICE GETTING STARTED AND OPERATIONS GUIDE Welcome To Surpass Hosting Service. This document contains instructions to help you get up and running with your new service. The instructions
More informationSYSTEM REQUIREMENTS... 5 FREE RESOURCES... 6 GETTING STARTED...
Table of Contents ABOUT... 4 Authorized Use... 4 Questions and Contact Information... 4 SYSTEM REQUIREMENTS... 5 FREE RESOURCES... 6 GETTING STARTED... 7 Account Creation Overview and Types of Accounts...
More informationRemote Desktop Services
Remote Desktop Services AMERICAN INSTITUTES FOR RESEARCH AIR REMOTE DESKTOP SERVICES (RDS) GUIDE Overview Welcome to AIR Remote Desktop Services! AIR Remote Desktop Services can be accessed from a Windows
More informationTable of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
More informationGoogle Trusted Stores Setup in Magento
Google Trusted Stores Setup in Magento Google Trusted Stores is a free badging program that can improve your conversion rate and average order size by reassuring potential customers you offer a great shopping
More informationActive Directory Validation - User Guide
Composite 2015-12-07 Composite A/S Nygårdsvej 16 DK-2100 Copenhagen Phone +45 3915 7600 www.composite.net Contents 1 INTRODUCTION... 3 1.1 Who Should Read This Guide? 3 1.2 Getting Started 4 2 CREATING
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More information1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
More informationGetting Started with StoreGrid Cloud
Getting Started with StoreGrid Cloud This document describes the steps to quickly sign up and start backing up your data to StoreGrid Cloud. I. Signing Up 1. Go to http://storegridcloud.vembu.com and select
More informationGuide to Training Teachers on the Co-op Dashboard
Guide to Training Teachers on the Co-op Dashboard https://www.hourrepublic.com Hour Republic is a tool used by (i) students to track co-op hours, activities, skills and more, and (ii) teachers to monitor
More information1. Right click using your mouse on the desktop and select New Shortcut.
offers 3 login page styles: Standard Login, List Login or Quick Time Punch. Each login page can be saved as a shortcut to your desktop or as a bookmark for easy fast login access. For quicker access to
More informationDocuSign for SharePoint Online v2.4
Quick Start Guide DocuSign for SharePoint Online v2.4 Published October 12, 2015 Overview DocuSign for SharePoint Online allows users to sign or send documents out for signature from a SharePoint Online
More informationDial-up Installation for CWOPA Users (Windows Operating System)
Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise
More informationUSER GUIDE CLOUDME FOR WD SENTINEL
USER GUIDE CLOUDME FOR WD SENTINEL Page 2 of 18 TABLE OF CONTENTS INTRODUCTION 3 Safe European Storage How does this really work? 3 3 GETTING STARTED 4 Setting up an account Setting up a company account
More informationMac OS X Secure Wireless Setup Guide
Mac OS X Secure Wireless Setup Guide Requirements: Apple computer with built-in AirPort card capable of WPA2-Enterprise encryption Mac OS X Snow Leopard version 10.6.0 or greater or Mac OS X Lion version
More informationUser Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007
Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...
More informationRSCCD REMOTE PORTAL TABLE OF CONTENTS: Technology Requirements NOTE
RSCCD REMOTE PORTAL The RSCCD Remote Portal allows employees to access their RSCCD Email (via Outlook Web Access), Department (Public) Folders, Personal (H Drive) Folder, and the District Intranet from
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationThis will open up a new window and take you to the BOXI home page
User Manual for the Business Objects Web Intelligence XI System (BOXI) Section 1: Getting Started with BOXI CONTENTS In this section you will learn how to log in to BOXI, find, open and view existing documents
More informationDropSend Getting Started Guide
DropSend Getting Started Guide DropSend Ltd. 2012 Step 1: How to send a file without registration If you want to quickly send a large file, you can do it from the homepage in just a couple of clicks. Here
More informationAbsolute IT Solutions Product Catalog / Sales Order Maker Application
Absolute IT Solutions Product Catalog / Sales Order Maker Application The android app that raise your sales figures Application Overview We believe our android application, AIS SOM, will effectively improve
More informationHELPDESK SYSTEM (HDS) USER MANUAL
HELPDESK SYSTEM (HDS) USER MANUAL Release No.: 2.0 prepared by OMESTI Berhad. TABLE OF CONTENTS 1.0 HOW TO ACCESS THE HELPDESK SYSTEM (HDS)... 1 2.0 HOW TO REGISTER NEW USER... 2 3.0 HOW TO RECOVER PASSWORD...
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of
More informationWelcome to Sookasa. Getting Started Guide for SafeMonk users
Welcome to Sookasa Getting Started Guide for SafeMonk users Welcome to Sookasa! About Us Like Safemonk, Sookasa provides Dropbox encryption to protect your information at the file level, so it s safe both
More informationASUS WebStorage Client-based for Windows [Advanced] User Manual
ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The
More informationAccessing The Doctors Clinic Physician Connect
Accessing The Doctors Clinic Physician Connect The Doctors Clinic s commitment to excellence in patient care presents healthcare providers in our community access to electronic health records. Here s how:
More informationFirst Time On-Campus VLab Setup Windows XP Edition
First Time On-Campus VLab Setup Windows XP Edition General: This guide is a step-by-step walkthrough of downloading, installing and configuring VMware View Client for the University of Cincinnati s VLab
More informationStudent Access Reference Guide
Student Access Reference Guide Table of Contents Student Access Overview... 2 Logging on to the Student Portal... 3 Password Security Question Setup... 4 Need Help Signing In... 6 Navigating the Student
More informationSSL VPN Setup for Windows
SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through
More informationRISKMASTER Business Intelligence Working with Reports User Guide
RISKMASTER Business Intelligence Working with Reports User Guide Statement of Confidentiality This documentation contains trade secrets and confidential information, which are proprietary to Computer Sciences
More informationTable of Contents. Table of Contents
Table of Contents Setup Instructions... 1 Step 1: Download the Required Components... 1 Step 2: Install and Run the Online Backup Module... 3 Step 3: Sign-Up to the Online Backup Service... 4 Step 4: Configure
More informationCloud Web Portal User Guide Version 2.0
Cloud Web Portal User Guide Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)
More information